We published the whitepaper, “Dell EMC PowerEdge R940 makes De Novo Aseembly easier”, last year to study the behavior of SOAPdenovo2 [1]. However, the whitepaper is limited to one De Novo assembly application. Hence, we want to expand our application coverage little further.

Dell PowerEdge VRTX was not supported for VMware ESXi 6.5 branch of ESXi thus far. Dell announced support for VRTX from Dell customized version of ESXi 6.5 A04 revision onwards. However there was a late breaking issue identified on dell-shared-perc8 (Version: 06.806.89.00) and ESXi 6.5.x.

The Dell EMC SC5020 array is a next-generation storage array that expands on the capabilities of our most popular SC Series model ever, the SC4020. Now we’re expanding on the number of technical resources to help you get the most out of SC5020 solutions.

RHEL 7.3 has Kernel Support for TPM 2.0. The User Space tools TPM2.0-tools and TPM2.0-TSS library are not present in RHEL 7.3. They are expected to be available in a future update of RHEL 7. If you wonder, how to check weather your system has TPM 2.0 device or not?

we demonstrated how to use Windows Deployment Services (WDS) to deploy a Nano Server VHD. Today, we'll focus on a manual deployment to the R730xd using a USB key. This deployment method will use legacy BIOS boot instead of UEFI boot.

Microsoft Windows Server 2016 will have an additional install option in the image that is, for lack of a better phrase, “for more sophisticated users”. This deployment option is located in a folder on the Microsoft Windows Server 2016 image and is called “\NanoServer”.

generation was just delivered on our new 14G. How great it is to power off/on a server remotely without having to go to your datacenter? It can save you headaches as well as time and money when issues arise.

iDRAC6, the Dell Remote Access Controller in the 11th generation of PowerEdge Servers support the protocols TLS version 1.0, TLS version 1.1 and TLS version 1.2 (cryptographic protocols designed to provide communications security over a computer network). Starting with firmware version 2.

Cloud security is one of the trending areas due to high adoption rates by small and huge businesses alike. Security of the virtual layer is very important from the customer’s perspective as all the private data is hosted over virtual machines.